信息网络安全 ›› 2018, Vol. 18 ›› Issue (10): 85-91.doi: 10.3969/j.issn.1671-1122.2018.10.012

• 理论研究 • 上一篇    下一篇

改进的保护身份的云共享数据完整性公开审计方案

姜红1(), 亢保元2, 李春青2   

  1. 1. 天津工业大学管理学院,天津 300387
    2. 天津工业大学计算机科学与软件学院,天津 300387
  • 收稿日期:2018-07-02 出版日期:2018-10-10 发布日期:2020-05-11
  • 作者简介:

    作者简介:姜红(1971—),女,陕西,讲师,硕士,主要研究方向为电子商务、安全商务方案等;亢保元(1965—),男,陕西,教授,博士,主要研究方向为密码学、信息安全等;李春青(1962—),男,天津,教授,博士,主要研究方向为大数据处理、云计算安全等。

  • 基金资助:
    国家自然科学基金[51378350];天津市应用基础与前沿技术计划[15JCYBJC15900]

Improved Auditing Schemes with Identity-preserving for the Integrity of Shared Data in the Cloud

Hong JIANG1(), Baoyuan KANG2, Chunqing LI2   

  1. 1. School of Management, Tianjin Polytechnic University, Tianjin 300387, China
    2. School of Computer Science and Software, Tianjin Polytechnic University, Tianjin 300387, China
  • Received:2018-07-02 Online:2018-10-10 Published:2020-05-11

摘要:

随着网络与信息技术的发展,云计算成了当今最热门的话题之一,云服务逐渐走进人们的生活,云服务商可以向数据用户提供数据存储和计算等服务。但是,在这种服务中必须有一个代表数据用户利益的第三方审计员定期验证用户外包数据的完整性。而且,在外包和审计过程中必须保护数据用户的身份和数据文件内容的安全。文章针对云共享数据完整性检测问题,利用数字签名技术和双线性对的性质,对两个保护用户身份的云共享数据完整性公开审计方案进行了改进,并在计算离散对数困难性问题假设下,对一个改进方案的安全性进行了证明。通过计算量和安全性比较,文章提出的改进方案有更严谨的安全性和相对小的计算成本。

关键词: 云计算, 数据完整性检测, 隐私保护, 数字签名, 安全性

Abstract:

With the development of Internet and information technology, cloud computing has become one of the hottest topic of the day, cloud service is getting into people’s life day by day, and provides data storage and computing service to data users. But, it is necessary for an auditor on users’ behalf to check the integrity of the outsourced data in the cloud. Also the cloud server must ensure the identities of the users and privacy of the data blocks. In this paper, based on the existing work, we use digital signature technology and the properties of the bilinear pairing and propose improved public auditing schemes with identity-preserving for the integrity checking of the shared data in the cloud and prove the security of one improved scheme under the assumption that the discrete logarithm problem is hard. Through comparison of computation and security, it is shown that the improved scheme proposed in this paper has more rigorous security and relatively smaller computation cost.

Key words: cloud computing, data integrity checking, privacy-preserving, digital signature, security

中图分类号: